CompTIA A+ 1002 - 15

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A type of hierarchical database structure used in Windows Server environments that enables centralized management of devices and resources on a network is known as: [] HomeGroup [] Active Directory [] Workgroup [] Windows domain

[] Active Directory

Which of the following is an example of a soft token? [] USB token [] Authenticator app [] Smart card [] Key fob

[] Authenticator app

Which of the following provides physical security measure against laptop theft? [] Cable lock [] Trusted Platform Module (TPM) [] Geotracking [] LoJack for Laptops

[] Cable lock

What type of preventive physical access controls would provide a basic means for securing door access? (Select 3 answers) [] Motion detection [] Lighting [] Door lock [] CCTV [] Proximity card reader [] Smart card reader

[] Door lock [] Proximity card reader [] Smart card reader

In Windows domain environment, the term "Home Folder" refers to a directory on a local PC where users can back up their data and files. [] True [] False

[] False

Which of the Windows Active Directory Group Policy settings allows network administrators to map a folder on a user's PC to a server-based location? [] Folder redirection [] Local Users and Groups [] User Account Control (UAC) [] Directory permissions

[] Folder redirection

In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings. [] Local Users and Groups [] Resource Monitor [] Group Policy [] User Account Control (UAC)

[] Group Policy

Which of the following are examples of hardware tokens? (Select 3 answers) [] Key fob [] Cable lock [] Passphrase [] Biometric reader [] RFID badge [] Smart card

[] Key fob [] RFID badge []Smart card

On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user. [] MDM policy [] Login script [] Group Policy [] Directory permissions

[] Login script

Which type of software enables a centralized administration of mobile devices? [] MFA [] MMC [] MDM [] MFD

[] MDM

Protection provided by security guards is an example of: [] Technical security control [] Physical security control [] Administrative security control [] Logical security control

[] Physical security control

A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as: [] MicroSD card [] Common Access Card (CAC) [] Proximity card [] Personal Identity Verification (PIV) card

[] Proximity card

A type of identification badge that can be held within a certain distance of a reader device to authenticate its holder is called: [] Smart card [] ID badge [] Soft token [] RFID badge

[] RFID badge

In IT security, the term "Entry control roster" refers to a list of personnel allowed to access restricted areas. [] True [] False

[] True

In computer security, a type of small-factor physical device used for authentication is commonly referred to as a hardware token. [] True [] False

[] True

In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes. [] True [] False

[] True

One of the measures for securing networking devices is the practice of disabling unnecessary services and unused ports. [] True [] False

[] True

Privacy filter (a.k.a. privacy screen) is a protective overlay placed on the computer screen that narrows the viewing angle, so the screen content is only visible directly in front of the monitor and cannot be seen by others nearby. Privacy filter is one of the countermeasures against shoulder surfing. [] True [] False

[] True

The term "Mantrap" refers to a physical security access control system used to prevent unauthorized users from gaining access to restricted areas by following another person. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door. [] True [] False

[] True

USB locks are mechanical devices used for blocking a computer's USB ports from unauthorized access. USB locks can also be used to prevent the removal of an external USB device attached to the computer. [] True [] False

[] True

Windows Active Directory service allows for grouping users and computers into containers known as Organizational Units (OUs). An OU is the smallest unit to which system administrators can assign Group Policy settings to manage the configuration and use of accounts and resources within a given OU. [] True [] False

[] True

Which of the following terms describes a large network of Windows-based PCs under single administration? [] HomeGroup [] Windows domain [] Active Directory [] Workgroup

[] Windows domain

A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called: [] fsutil [] diskpart [] dd [] format

[] dd

Which of the Linux command-line commands allows to terminate a running process? [] taskkill [] exit [] shutdown [] kill

[] kill

Which of the following commands is used for invoking a text editor in Unix-like operating systems? [] edit [] notepad [] vi [] bcdedit

[] vi


Ensembles d'études connexes

Anatomy - Extensor indicis muscle

View Set

Adult II - Exam 2 practice questions

View Set

Linear Algebra Section 3.4-4.3 True/False

View Set

Chapter 42: Musculoskeletal Disorders - NCLEX REVIEW

View Set

AP World History Period 4: Global Interactions (c. 1450 to c. 1750)

View Set

Chapter 62: Concepts of Care for Patients with Kidney Disorders

View Set

OAE practice questions professional knowledge pk-12 test 004

View Set